|Bruce Schneier: The security mirage - TED.com|
The feeling of security and the reality of security don't always match, says computer-security expert Bruce Schneier. At TEDxPSU, he explains why we spend billions addressing news story risks, like the "security theater" now playing at your local airport, while neglecting more probable risks -- and how we can break this pattern.
Keywords: TEDTalks; TEDxPSU; TED; Talks; culture; global issues; security; technology; 2010
|Del Harvey: The strangeness of scale at Twitter - TED.com|
When hundreds of thousands of Tweets are fired every second, a one-in-a-million chance -- including unlikely sounding sounding scenarios that could harm users -- happens about 500 times a day. For Del Harvey, who heads Twitter’s Trust and Safety Team, these odds aren’t good. The security maven spends her days thinking about how to prevent worst-case scenarios while giving voice to people around the globe...
Keywords: TedTalks; TED; Talks; security; social media; TED2014; 2014
|Lorrie Faith Cranor: What’s wrong with your pa$$w0rd? - TED.com|
Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users -- and secured sites -- make to compromise security. And how, you may ask, did she study thousands of real passwords without compromising the security of any users? That's a story in itself. It's secret data worth knowing, especially if your password is 123456 ...
Keywords: TedTalks; TED; Talks; communication; privacy; security; technology; TEDxCMU; 2014
|Chris Domas: The 1s and 0s behind cyber warfare - TED.com|
Chris Domas is a cybersecurity researcher, operating on what’s become a new front of war, "cyber." In this engaging talk, he shows how researchers use pattern recognition and reverse engineering (and pull a few all-nighters) to understand a chunk of binary code whose purpose and contents they don't know.
Keywords: TedTalks; TED; Talks; security; software; technology; war; TEDxColumbus; 2013
|Mikko Hypponen: How the NSA betrayed the world's trust -- time to act - TED.com|
Recent events have highlighted, underlined and bolded the fact that the United States is performing blanket surveillance on any foreigner whose data passes through an American entity -- whether they are suspected of wrongdoing or not. This means that, essentially, every international user of the internet is being watched, says Mikko Hypponen. An important rant, wrapped with a plea: to find alternative solutions to using American companies for the world's information nee
Keywords: TEDTalks; TED; Talks; Internet; computers; global issues; security; technology; TEDxBrussels; 2013
|Guy-Philippe Goldstein: How cyberattacks threaten real-world peace - TED.com|
More and more, nations are waging attacks with cyber weapons -- silent strikes on another country's computer systems that leave behind no trace. (Think of the Stuxnet worm.) At TEDxParis, Guy-Philippe Goldstein shows how cyberattacks can leap between the digital and physical worlds to prompt armed conflict -- and how we might avert this global security hazard.
Keywords: TEDTalks; TEDxParis 2010; TED; Talks; computers; global issues; politics; security; technology; war; 2010
|Todd Humphreys: How to fool a GPS - TED.com|
Todd Humphreys forecasts the near-future of geolocation when millimeter-accurate GPS "dots" will enable you to find pin-point locations, index-search your physical possessions ... or to track people without their knowledge. And the response to the sinister side of this technology may have unintended consequences of its own. (Filmed at TEDxAustin.)
Keywords: TEDTalks; TED; Talks; TEDxFeatured; global issues; hack; security; technology; tedx; TEDxAustin; 2012
|Avi Rubin: All your devices can be hacked - TED.com|
Could someone hack your pacemaker? At TEDxMidAtlantic, Avi Rubin explains how hackers are compromising cars, smartphones and medical devices, and warns us about the dangers of an increasingly hack-able world.
Keywords: TEDTalks; TED; Talks; Internet; TEDxFeatured; computers; hack; security; technology; TEDxMidAtlantic; 2011
|Juan Enriquez: Your online life, permanent as a tattoo - TED.com|
What if Andy Warhol had it wrong, and instead of being famous for 15 minutes, we’re only anonymous for that long? In this short talk, Juan Enriquez looks at the surprisingly permanent effects of digital sharing on our personal privacy. He shares insight from the ancient Greeks to help us deal with our new “digital tattoos.”
Keywords: TEDTalks; TED; Talks; culture; security; social media; technology; TED2013; 2013
|Hasan Elahi: FBI, here I am! - TED.com|
After he ended up on a watch list by accident, Hasan Elahi was advised by his local FBI agents to let them know when he was traveling. He did that and more ... much more.
Keywords: TEDTalks; TEDGlobal 2011; TED; Talks; art; arts; data; security; war; web; 2011
|Marc Goodman: A vision of crimes in the future - TED.com|
The world is becoming increasingly open, and that has implications both bright and dangerous. Marc Goodman paints a portrait of a grave future, in which technology's rapid development could allow crime to take a turn for the worse.
Keywords: TEDTalks; TED; Talks; Internet; biology; crime; future; global issues; law; open-source; security; technology; violence; TEDGlobal 2012; 2012